Showing 5,801 - 5,820 results of 8,683 for search 'optimal computing algorithms', query time: 0.17s Refine Results
  1. 5801
  2. 5802

    Research on <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mi>p</mi> <mn>2</mn> </msup> </mrow> </msub></math></in... by Zhanpeng JIANG, Mingwei SUN, Hai HUANG, Jiang XU, Zhiwei LIU, Rui BAI, Zhou FANG, Jiaxing QU

    Published 2022-02-01
    “…A quadratic extended-domain finely integrated operand scanning (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mi>p</mi> <mn>2</mn> </msup> </mrow> </msub> </math></inline-formula>-FIOS) modular multiplication algorithm for bilinear pairs was proposed to address the problem of low efficiency of bilinear pair operations.The algorithm effectively reduced the number of modular reductions in modular multiplication by optimizing the operation process of (AB+CD)mod P under the quadratic expansion domain.Two hardware architectures and their scheduling methods were designed to meet different application requirements.In order to improve the computational efficiency of the algorithm, the TSMC 55 nm process was used to realize the bilinear pairing operation unit.Compared with the existing literature, the designed architecture is superior to similar modular multiplication designs in performance indicators such as the first modular multiplication time, clock frequency and the area-time product, and also has certain advantages in the overall Optimal ate pair implementation.…”
    Get full text
    Article
  3. 5803

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…As concerns about data privacy grow, algorithms and techniques for achieving robust privacy-preserving machine learning (PPML) have become a pressing technical challenge. …”
    Get full text
    Article
  4. 5804

    STRATEGY OF DATA INTEGRITY CONTROL FOR SYSTEM WIDE INFORMATION MANAGEMENT CONCEPT by L. E. Rudel'son, S. N. Smorodskiy, A. S. Stepanenko

    Published 2017-09-01
    “…An optimal strategy for the algorithm application has been constructed (by the criterion of computational resource expenses).…”
    Get full text
    Article
  5. 5805

    Distinguishing novel coronavirus influenza A virus pneumonia with CT radiomics and clinical features by Lianyu Sui, Huan Meng, Jianing Wang, Wei Yang, Lulu Yang, Xudan Chen, Liyong Zhuo, Lihong Xing, Yu Zhang, Jingjing Cui, Xiaoping Yin

    Published 2024-12-01
    “…Abstract Objectives To differentiate novel coronavirus pneumonia (NCP) with influenza A virus (IAV) pulmonary infection based on computed tomography (CT) radiomics features combined with clinical feature. …”
    Get full text
    Article
  6. 5806
  7. 5807

    Improved global convergence results for augmented Lagrangian method with exponential penalty function by Frank Navarro Rojas, Luis G. Ticona Quispe

    Published 2024-12-01
    “…Finally we give optimality and feasibility results for the convex case.…”
    Get full text
    Article
  8. 5808

    One of the approaches to the organization of the modern educational process by A. G. Savenko, Yu. A. Skudnyakov

    Published 2021-03-01
    “…The mathematical basis of the rotational-hybrid model is set theory using graph models, which compare favorably with other mathematical apparatus in visibility and a matrix form of representation that can be easily processed on a computer. The effectiveness of using the developed rotational-hybrid model and its algorithmic implementation is illustrated with the help of developed teaching-testing electronic teaching tool, introduced into educational process at the Department of Information Systems and Technologies of the Institute of Information Technologies of the Belarusian State University of Informatics and Radioelectronics.…”
    Get full text
    Article
  9. 5809
  10. 5810
  11. 5811
  12. 5812

    Route Generation and Built Environment Behavioral Mechanisms of Generation Z Tourists: A Case Study of Macau by Ying Zhao, Pohsun Wang, Yafeng Lai

    Published 2025-06-01
    “…However, limited research has integrated behavioral drivers with algorithmic travel route optimization, particularly in the context of Generation Z tourists. …”
    Get full text
    Article
  13. 5813

    A Coverage-Based Cooperative Detection Method for CDUAV: Insights from Prediction Error Pipeline Modeling by Jiong Li, Xianhai Feng, Yangchao He, Lei Shao

    Published 2025-05-01
    “…This framework incorporates the target HPR and the seeker detection FOV models, with an objective function defined for coverage optimization. Finally, inspired by wireless sensor network (WSN) coverage strategies, we implement the starfish optimization algorithm (SFOA) to enhance computational efficiency. …”
    Get full text
    Article
  14. 5814
  15. 5815
  16. 5816
  17. 5817

    DBO-DELM Method for Predicting Rolling Forces in Cold Rolling by LI Xiaoyang, PIAO Chunhui, WANG Xuelei, ZHANG Mingzhi

    Published 2024-12-01
    “…Aiming at the problems of many assumptions, large computational errors and poor generalisation performance of the traditional rolling force prediction model, a cold rolling force prediction model (DBO-DELM) using the dung beetle optimizer algorithm (DBO) to optimise the deep extreme learning machine (DELM) is proposed. …”
    Get full text
    Article
  18. 5818
  19. 5819
  20. 5820